Blog Posts Tagged with "Security Awareness"

Amusingly, the plugin’s flood of attention means it is already racking up quite the bug count. For example, it does not currently do any NSFW prevention, and the results are returned in plaintext also. Have fun explaining that one to the ol’ boss-a-roni...

Concerned over rising threats online, Cyber security agents in Africa are taking a proactive step by collaborating with global network-security experts to curb cybercriminal activities on the continent, where they will share information and technical know-how...

Whomever is elected president will face an unknown unseen digital enemy unlike any other president has seen in history. Think before you click. Know who’s on the other side of that instant message. What you say or do in cyberspace stays in cyberspace — for many to see, steal and use against you or your government...

Is Windows 8 the next operating system for your enterprise? In this article, we will take a quick look at Microsoft’s new OS – Windows 8. We will see some of the new security features that make it more secure than its predecessor Windows 7...

I'm running a small experiment on myself in which I've set up an account on a public, high-traffic web-based system out there that has a ton of my personal information. I've not changed my password in almost 6 months, but I still feel relatively good and certain that I am the only one who has access to my stuff...

Instead of using your actual name as your login, why not use something different that is hard to guess and doesn’t reveal anything about your identity? It always pays to make it as tough on the cyber-criminals as possible..

The connection between improved security and user education is so well-established as to be almost axiomatic. Better technology, coding practices and testing can only accomplish so much. So what’s being done about the dearth of solid user education?

“Most did not recognise that people using fake profiles, perhaps masquerading as school friends, could capture information and movements. Few consider the possibilities of data mining and how patterns of behaviour can be identified over time..."

There are few pseudo holiday celebration days or months that truly get my attention. But National Cyber Security Awareness Month is the one month a year that consumers are reminded by news reporters, government agencies, non-profits and companies that security is everyone’s responsibility...

Every day I see yet another situation where employees misused, abused or otherwise accused social media sites to the chagrin of their employers. Businesses need to make a coordinated effort, using a combination of policies, training and technology to mitigate the risks of workers using social media sites...

No information is guaranteed to be 100% breach-free. You must be vigilant when it comes to knowing what information about you is online. No business entity is solely responsible for securing the Internet. You play the most important role in protecting your own digital life...

The method I used for this particular tactic was to monitor the conversational rhythm. Then inject into it and take it over allowing me to guide the conversation. The skill set that allows you to walk into a conversation and take it over can’t be understated...

McAfee’s latest Threats Report shows a growth in malicious websites replacing botnets as the primary infection mechanism. This means that by just simply visiting a website you could be exposed to malicious things that can do harm to your computer, mobile device, finances or identity...

What does Internet safety mean to the average person? It may vary depending upon age, how you use the internet, and the type of work that you do that involves the digital world. Here are some sobering statistics that might give you a perspective...

How do you teach paranoia and suspicion? We often hire people because of their willingness to help others, their good communication skills, their ability to be responsive, etc. As we work through securing our humans, we need to strike a balance – trust but verify, assist but not unquestioningly...

How often do you think about your cell phone or smartphone privacy? Sure, you think about its physical security, but how often do you think about the security of your data? Your contacts, your email addresses, your location data, your apps, etc. You probably don’t think about this enough...